Difference between revisions of "Configuration"

From MS Computech
Jump to: navigation, search
Line 21: Line 21:
 
9. [http://www.dmzstrom.com/wiki/index.php/RHEL4_Root_login RHEL4 Permit root login]  
 
9. [http://www.dmzstrom.com/wiki/index.php/RHEL4_Root_login RHEL4 Permit root login]  
  
10. [http://www.dmzstrom.com/wiki/index.php/Enable_SSH_ESXi Enable SSH ESXi]
+
10. [http://www.dmzstrom.com/wiki/index.php/Enable_SSH_ESXi Enable SSH ESXi]
 +
 
 +
11. [http://www.dmzstrom.com/wiki/index.php/Psad_Syslog-ng PSAD Syslog-ng]
  
 
<br>
 
<br>

Revision as of 18:09, 31 August 2008

Howto from various source  USE AT YOUR OWN RISK

Server

1. Acronis agent on debian etch

2. Bridge Firewall Linux

3. Citrix + LotusNote

4. IPTables MSN

5. Openvz + IPTables

6. RRAS Windows 2003

7. Metasploit on Debian

8. Postfix Mail Server Debian

9. RHEL4 Permit root login

10. Enable SSH ESXi

11. PSAD Syslog-ng


Other

1. WPA_Supplicant

2. Reset Fortigate password

3. Compress tar.gz for newbie

4. BackTrack3 Commandline Install

5. BT Dualboot

6. Reset password IPCop

7. MT880 Router

8. Del Printer registry

9. 98 access cifs XP

10. Access CIFS XP No password